Caleidoscope Associates Ltd

Anzen secured cloud storage

Data securitization enabling cost-effective use of any cloud-based storage of your choice. The Anzen securitization process provides unbreakable protection against breaches, theft and manipulation. Anzen also allows organisations to retain data sovereignty regardless of which territory the data is stored in.


  • Hyper secure data storage
  • Works with other security measures, e.g. encryption
  • Seamless integration with existing applications
  • Open API
  • Available as Salesforce App


  • Lower cost of secure cloud storage
  • End-to-end security of data
  • Simple implementation
  • Data can be stored in any location
  • Adhere to GDPR data sovereignty


£6,000 to £75,000 a licence a quarter

  • Free trial available

Service documents


G-Cloud 12

Service ID

5 9 6 4 8 4 6 7 4 2 0 7 2 1 4


Caleidoscope Associates Ltd Cato Rockne-Meyer
Telephone: 07811332511

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Anzen security solution enables lower cost cloud storage of Salesforce data via a Salesforce App (extension).
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements
  • Salesforce
  • Support for open API

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours during office hours
Within 24 hours outside office hours
Other support levels are available on request
Office hours: Monday-Friday 0800-1800
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat support enables users to raise queries and issues in text form via the online chat function on our website. Web chat enquiries are forwarded to the on-duty support staff who respond directly from their smartphone or computer.
Web chat accessibility testing
Not applicable as we do not use assistive technology at this point in time.
Onsite support
Yes, at extra cost
Support levels
We offer bespoke service level agreements and ad-hoc support.
The cost of bespoke service level agreements depends on the level of support required. The cost is based on the resources needed to provide the support.
Ad-hoc support is charged at standard rates, except for support at weekends and out of office hours, i.e. Monday-Friday 1800-0800.
Support available to third parties

Onboarding and offboarding

Getting started
We provide installation of the Salesforce App and provide training of the system administrator. We also provide documentation for support and instructions for the end-users.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
MS PowerPoint
End-of-contract data extraction
If data securitization is no longer required, then the customer needs to retrieve all securitized data by downloading it.
End-of-contract process
If the customer decides that the securitization is no longer required, or wish to move to a different solution, then the customer will need to download and move the data out of the securitized storage before the end of the license.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
If the customer has deployed a Salesforce Mobile App, then the service can be included in this app.
Service interface
Description of service interface
The service uses Salesforce Lightning user interface components.
Accessibility standards
None or don’t know
Description of accessibility
The user can select records and files to be securitized and stored in the cloud. The customer system owner decides which storage locations to use (can be a mixture of on-premise and multiple cloud storage providers).
Accessibility testing
None as the service uses the Salesforce Lightning user interface.
What users can and can't do using the API
The API allows the user to perform the Anzen securitization process (and its reverse) on files.
This is achieved using simple data structures, the main one being the dataset. A dataset represents the storage of a single piece of data (in this case a file). A file can be uploaded and assigned to the dataset for later processing.
Once a dataset has been created and a file has been uploaded, a securitization job can be created. This will take the uploaded file and securitize it to the specified locations using the Anzen process.
When the original file is required at a later point in time, it is a simple process of creating a restore job. This will perform the inverse securitization process and make the restored file available for download to the user.
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available


Independence of resources
We use cloud-compute (AWS, Azure, Oracle, etc.) to provide elastic on-demand infrastructure scaling.


Service usage metrics
Metrics types
Usage logs are available to the system administrator. These can be exposed to the end users, if required.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Anzen Technology Systems Ltd

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data can be retrieved using the reverse securitization process, i.e. downloading files from Salesforce or through the API.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Original format (files are retrieved to original format)
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Service works with any file format

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Customer can choose the in-transit data protection required between their network and their chosen cloud provider.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
If the Anzen process is deployed to the same cloud infrastructure as the customer's preferred cloud storage provider, then there is no inter-connected network.
If the Anzen process is deployed to a different cloud infrastructure to the cloud storage provider(s), then the network protection depends on the chosen cloud infrastructure providers.

Availability and resilience

Guaranteed availability
The service can be implemented on all major platform hosts to be agreed with the customer. If a host platform is not specified by the customer, then we use Amazon Elastic Compute Cloud (Amazon EC2).
Refund credits:
Less than 99.99% but equal to or greater than 99.0% = 10%
Less than 99.0% but equal to or greater than 95.0% = 30%
Less than 95.0% = 100%
Approach to resilience
Service resilience is set up to meet the customer's requirement for resilience.
Outage reporting
In the case of service outages, customers are notified by email.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Other
Other user authentication
Authentication method is defined by the customer and their chosen cloud providers.
Access restrictions in management interfaces and support channels
When installed in Salesforce, the customer administrator determines and controls the access restrictions within Salesforce.

When deployed as an API, the cloud host authentication can be used or additional authentication implemented.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Other
Description of management access authentication
Authentication for management access is defined by the customer and their chosen cloud providers.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Our security approach mirrors that of the Anzen Technology Systems' security governance.
Information security policies and processes
Our information security policies and processes mirror those of Anzen Technology Systems.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Standards and procedures are defined by the customer and their chosen cloud providers.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Standards and procedures are defined by the customer and their chosen cloud providers.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Standards and procedures are defined by the customer and their chosen cloud providers.
Incident management type
Supplier-defined controls
Incident management approach
Standards and procedures are defined by the customer and their chosen cloud providers.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)
  • Other
Other public sector networks
API can integrated with any public sector network


£6,000 to £75,000 a licence a quarter
Discount for educational organisations
Free trial available
Description of free trial
30-day trial of API or Salesforce App

Service documents